Live Verify: the next logical step up from the iPhone's Live Text.
Live Verify turns a printed claim into a trustable handshake: snap the document, OCR locally, hash it, and confirm the issuer domain still serves that hash. Think of it as a trust primitive for the physical world: readable text that can also be checked.
Documents carry a verify: line that points to the issuer’s domain. Live Verify automates the rest: capture, OCR, normalization rules, SHA-256, then GET the issuer URL with the hash. The app flashes “Claim Verified” only if that domain currently vows to that exact text hash.
https://issuer.example.com/claims/<sha256>; 404 = not found, 200 = status returned (OK / REVOKED / etc.).
verify:issuer.example.com/claims
... implies a lookup at ...https://issuer.example.com/claims/<sha256>verification-meta.json.
Revocation is part of trust. If an ID is stolen, a license suspended, or a credential withdrawn, the issuer can change the response so verifiers stop treating the printed claim as current.
Some issuers may return an operational instruction, e.g. Stolen ID — please retain/cut in half and contact <policy URL> (quoting reference Nnnnnnn).
Issuers keep authority by publishing from their own domains, and verifiers choose what they trust. There’s no single global registry to control access—at the cheapest end, a static web server can host the hash lookups.
The result is anti-fraud without friction: the familiar camera flow becomes “Snap → Verified / Denied” at the point of use.
OCR, normalization, and SHA-256 run entirely on-device, and the only outbound call is the hash lookup. Learn why one-way hashes are safe to publish via our one-way hash explainer and see the full protocol in the Privacy Declaration.
Search the catalog or browse categories to see how Live Verify meets fraud, compliance, and operational needs across industries.